WO2017201999A1 - Procédé, dispositif, terminal et support d'informations de chiffrement de fichier - Google Patents

Procédé, dispositif, terminal et support d'informations de chiffrement de fichier Download PDF

Info

Publication number
WO2017201999A1
WO2017201999A1 PCT/CN2016/108608 CN2016108608W WO2017201999A1 WO 2017201999 A1 WO2017201999 A1 WO 2017201999A1 CN 2016108608 W CN2016108608 W CN 2016108608W WO 2017201999 A1 WO2017201999 A1 WO 2017201999A1
Authority
WO
WIPO (PCT)
Prior art keywords
predetermined file
file
encrypted
password
gesture
Prior art date
Application number
PCT/CN2016/108608
Other languages
English (en)
Chinese (zh)
Inventor
相薇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017201999A1 publication Critical patent/WO2017201999A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Definitions

  • the present invention relates to the field of communications, and in particular, to a file encryption method, apparatus, terminal, and storage medium.
  • the encryption process is not performed during the photographing process, and generally, the photographing is completed and the photograph is saved to the memory before the appropriate encryption can be performed, thereby failing to realize the photo in the process of photographing the photo to the encryption process.
  • Confidential processing; and, the current main encryption method is fingerprint encryption, and fingerprint encryption is not strict enough, all fingerprints registered on the mobile phone can be decrypted, not unique.
  • the video, short message or other files stored in the terminal need to be encrypted after the creation and storage, resulting in a relatively low file security.
  • the embodiment of the invention provides a file encryption method, device, terminal and storage medium to solve at least the problem of low security of files existing in the related art.
  • a file encryption method comprising: acquiring an input encrypted password before generating a predetermined file or generating a predetermined file; and using the encrypted password when generating the predetermined file The predetermined file is encrypted.
  • the method further includes: hiding the encrypted predetermined file.
  • obtaining the input encrypted password includes: acquiring a first gesture action by using two or more infrared sensors; converting the first gesture action into a first digital signal by analog-to-digital conversion; determining the first digital signal For the encrypted password.
  • the encrypting the predetermined file by using the encrypted password comprises: determining a suffix of a file name of the predetermined file; and encrypting the predetermined file by modifying the suffix by using the encrypted password .
  • the method further includes: acquiring an input decryption password; decrypting the encrypted predetermined file by using the decryption password, and displaying the Describe the document.
  • obtaining the input decryption password includes: after entering a storage interface for storing the predetermined file, acquiring the input decryption password.
  • the obtaining the input decryption password comprises: acquiring a second gesture action by using two or more infrared sensors; converting the second gesture action into a second digital signal by analog-to-digital conversion; determining the The second digital signal is the decryption password.
  • the encrypted password is a first digital signal obtained by converting a first gesture obtained by using two or more infrared sensors
  • a sliding path of the second gesture and the first The sliding path of the gesture action is reversed.
  • the predetermined file when the predetermined file is encrypted by modifying the suffix of the file name of the predetermined file by using the encrypted password, the encrypted file is decrypted by using the decrypted password.
  • displaying the predetermined file includes: restoring a suffix of the file name of the predetermined file by using the decryption password; and displaying the predetermined file with the suffix restored.
  • the method further comprises: when it is determined to exit the display interface for displaying the predetermined file, encrypting the predetermined file again by using the encrypted password.
  • a file encryption apparatus including: an acquisition module configured to acquire an input encryption password before generating a predetermined file or generating a predetermined file; and an encryption module configured at the generation site When the predetermined file is described, the predetermined file is encrypted by using the encrypted password.
  • a terminal comprising the apparatus described above.
  • a storage medium is also provided.
  • the storage medium is arranged to store program code for performing the above steps.
  • the file encryption method, device, terminal, and storage medium encrypt the predetermined file while generating the predetermined file, thereby eliminating the need to perform the encryption operation after saving the predetermined file, thereby effectively ensuring that the file is encrypted.
  • the security of the file effectively solves the problem of low security of files existing in the related art.
  • FIG. 1 is a block diagram showing the hardware structure of a mobile terminal of a file encryption method according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a file encryption method according to an embodiment of the present invention.
  • FIG. 3 is a schematic view showing the distribution of an infrared sensor according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a gesture according to an embodiment of the present invention.
  • FIG. 5 is an encrypted block diagram of a photographing process according to an embodiment of the present invention.
  • FIG. 6 is an encryption flowchart of a photographing process according to an embodiment of the present invention.
  • FIG. 7 is a block diagram of decryption in accordance with an embodiment of the present invention.
  • FIG. 8 is a flowchart of decryption in accordance with an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of a sequence of encryption and decryption gestures according to an embodiment of the present invention.
  • FIG. 10 is a block diagram showing the structure of a file encryption apparatus according to an embodiment of the present invention.
  • FIG. 1 is a hardware structural block diagram of a mobile terminal of a file encryption method according to an embodiment of the present invention.
  • mobile terminal 10 may include one or more (only one shown in FIG. 1) processor 102 (processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA. And a memory 104 that stores data and a transmission device 106 that is disposed in a communication function.
  • processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA.
  • a memory 104 that stores data and a transmission device 106 that is disposed in a communication function.
  • the structure shown in FIG. 1 is merely illustrative and does not limit the structure of the above electronic device.
  • the mobile terminal 10 may also include more or fewer components than those shown in FIG. 1, or have a different configuration than that shown in FIG.
  • the memory 104 can be configured in a software program and a module for storing application software, such as a program instruction/module corresponding to the file encryption method in the embodiment of the present invention, and the processor 102 is stored by running
  • the software program and modules within the memory 104 perform various functional applications and data processing, i.e., implement the methods described above.
  • Memory 104 may include high speed random access memory, and may also include non-volatile memory such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
  • memory 104 may further include memory remotely located relative to processor 102, which may be connected to mobile terminal 10 over a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • Transmission device 106 is configured to receive or transmit data via a network.
  • the above-described network specific example may include a wireless network provided by a communication provider of the mobile terminal 10.
  • the transmission device 106 includes a Network Interface Controller (NIC) that can be connected to other network devices through a base station to communicate with the Internet.
  • the transmission device 106 can be a Radio Frequency (RF) module configured to communicate with the Internet wirelessly.
  • NIC Network Interface Controller
  • RF Radio Frequency
  • FIG. 2 is a flowchart of a file encryption method according to an embodiment of the present invention. As shown in FIG. 2, the process includes the following steps:
  • Step S202 acquiring an input encrypted password before generating a predetermined file or generating a predetermined file
  • Step S204 when generating the predetermined file, encrypting the predetermined file by using the encrypted password.
  • the above operation may be performed by the terminal.
  • the predetermined file is encrypted while the predetermined file is generated, it is not necessary to perform the encryption operation after the predetermined file is saved, thereby effectively ensuring the security of the file and effectively solving the file existing in the related art.
  • the following operations may also be performed: Hide the encrypted scheduled file.
  • the encrypted file can be hidden, so that other users cannot perceive the existence of the predetermined file, and the security factor of the predetermined file is further improved.
  • the input encrypted password may be acquired in the above step S202 by acquiring the input first gesture action by using two or more infrared sensors; converting the first gesture action into a first digital signal; determining that the first digital signal is the encrypted password.
  • the gesture action captured by the infrared sensor can be converted into an encrypted password, wherein the number of infrared sensors in one terminal can be flexibly set, for example, set to four, and respectively at the four corners of the terminal screen. The settings are as shown in FIG. 3; or, set to five, in addition to setting an infrared sensor on each of the four corners of the terminal screen, an infrared sensor may be disposed in the middle of the terminal screen.
  • the first gesture action may be 8 words in the air.
  • the first digital signal may include a hexadecimal digital signal.
  • encrypting the predetermined file by using the encrypted password includes: determining a suffix of the file name of the predetermined file; and encrypting the predetermined file by modifying the suffix by using the encrypted password.
  • the predetermined file may not be opened normally, and therefore, the file may be encrypted by modifying the suffix of the file name.
  • encryption can also be performed by modifying the attributes of the predetermined file.
  • the method further includes: acquiring an input decryption password; decrypting the encrypted predetermined file by using the decryption password, and displaying the predetermined reservation file.
  • obtaining the input decryption password includes: After storing the storage interface of the predetermined file, the input decryption password is obtained.
  • the storage interface may be a library in the terminal. After entering the library, the decryption password is input on the gallery display interface, and the corresponding encrypted file may be decrypted and displayed.
  • the obtaining the input decryption password includes: acquiring a second gesture action by using two or more infrared sensors; and converting the second gesture action into a second digital signal by analog-to-digital conversion; The second digital signal is determined to be a decryption password.
  • the above-described infrared sensor can also be used to capture the gesture action and convert the captured gesture action into a decryption password.
  • the encrypted password is a first digital signal obtained by converting a first gesture obtained by using two or more infrared sensors
  • a sliding path of the second gesture and the foregoing The sliding path of a gesture action is reversed.
  • the decryption process of the gesture in the opposite direction can further improve the security of the file.
  • the encrypted predetermined file when the predetermined file is encrypted by modifying the suffix of the file name of the predetermined file by using the encrypted password, the encrypted predetermined file is decrypted by using the decrypted password, and displayed.
  • the predetermined file includes: a suffix for restoring the file name of the predetermined file by using the decryption password; and displaying the predetermined file with the suffix restored.
  • the method further includes: when it is determined to exit the display interface for displaying the predetermined file, encrypting the predetermined file again by using the encrypted password.
  • the terminal when the user browses the predetermined file and exits the storage interface of the predetermined file, the terminal re-encrypts the predetermined file immediately after exiting the storage interface, and may encrypt the original encrypted password. deal with.
  • the encryption operation is performed during the photographing or imaging process, and the encryption is performed by red.
  • the complex gestures implemented by the outside sensor are completed.
  • four small infrared sensors are built in the terminal, and the image is encrypted by a palm-shaped 8-word method.
  • the generated 8-word graphic is converted into a hexadecimal digital signal by analog-to-digital conversion as the first two digits of the generated picture or video file name and the corresponding suffix name (may also be used as the suffix name of the picture or video file).
  • the generated picture or video is generally invisible in the library because of the encryption process, and only the corresponding user knows the existence of the picture, and the user can proceed before the user enters the library to open the encrypted picture.
  • the corresponding finger operation (ie, the decryption operation), the operation is received, and converted into a corresponding digital signal, and then matched with the secret used by the saved picture. If they are consistent, the first two bytes of the file name are temporarily removed, and the operation is resumed.
  • the original file suffix name the correct naming file for the user to consult, if the review is completed, exit the gallery interface, then immediately encrypt again.
  • the reverse direction gesture action can be used for decryption, and after a series of processing, it becomes a string of digital codes, and the digital code can be compared with the encryption secret after the reverse order processing, and the security is performed. higher.
  • the front panel of the smart terminal can have four infrared sensors built in, as shown in FIG. 3 above, the four infrared sensors need to be placed at the four corners of the terminal (assuming that the infrared sensor in the upper left corner is numbered 101, upper right The number of the infrared sensor of the corner is 102, the number of the infrared sensor in the lower left corner is 103, and the number of the infrared sensor in the lower right corner is 104), and the palm (or finger) is sequentially drawn in the order of 101 to 102 to 103 to 104 to 101. According to the size and time of the infrared light return value, a figure drawn by the palm is generated as shown in FIG. 4 .
  • the four infrared sensors receive the reflected infrared light value and the corresponding time value, and recover the graphic drawn by the palm according to the maximum order of the received infrared light.
  • the number and position of the infrared sensors in the above terminal can be flexibly set, and the image swiped by the palm can also be freely defined (for example, a rectangle is drawn). Therefore, for a single use, the palm is crossed.
  • the image can be unique.
  • FIG. 5 is a schematic diagram of a process of encrypting a photographing process.
  • the photo process encryption operation mainly involves five modules, namely an image sensor module, a gesture sensor, an A/D conversion module, an encryption processing module, and a storage module.
  • the specific process is as follows:
  • Step 1 Turn on the camera to enter the framing mode, and the gesture sensor and image sensor enter the working mode respectively.
  • the user operates his own gestures directly above the screen of the mobile phone, such as drawing a character, drawing a square, and the infrared gesture sensor recovers the gesture pattern according to the time of the strongest infrared light reflected from the palm;
  • Step 2 The finger clicks on the camera button, and the image sensor starts to receive the different intensity light of the received scene and converts it into an analog electrical signal;
  • the third step analog image electrical signal, the simulated gesture signal enters the A/D conversion module at the same time, and the A/D conversion module mainly converts the analog signal into a digital signal that is convenient for the central processor to process;
  • the fourth step the image digital signal and the gesture digital signal respectively enter the encryption processing module.
  • the encryption processing module includes several aspects of work, firstly, the digital signal is received for optimization, amplification, correction, etc., and is converted into a complex digital operation.
  • FIG. 6 is an encryption flowchart of a photographing process according to an embodiment of the present invention. As shown in FIG. 6, the method includes the following steps:
  • Step S600 Start.
  • Step S601 For the camera function, the user turns on the terminal device camera to enter the framing mode; for the camera function, the user directly enters the recording interface.
  • Step S602 For the camera function, the framing mode system automatically gives a certain waiting time, during which the gesture sensor is in a working state, monitoring whether there is a gesture action signal, if any Directly entering the gesture signal receiving step, go to step S603; if the gesture signal is not received within the prescribed time period, directly enter the photographing step S604, and for the camera function, the gesture sensor can work synchronously with the image sensor.
  • Step S603 recovering the received gesture analog signal by the infrared sensor, and then performing specific analog-to-digital conversion, and then proceeds to the next encryption processing module, and proceeds to step S606.
  • Step S604 If the user does not find any gesture action, directly take a photo or video recording.
  • Step S605 The picture analog signal will be received, and after analog-to-digital conversion, a series of digital operations will become a specific digital signal.
  • Step S606 Then use the gesture digital signal to perform the encryption operation.
  • the typical operation of the encryption operation here is: the digital signal output by the gesture action is converted into a hexadecimal number, and then the hexadecimal number is used as the first two digits of the generated image file name and corresponding The suffix name, the algorithm here can also be customized.
  • Step S607 After the encryption, the picture enters the memory saving, and the process ends.
  • gestures are not only applied to pictures, but also can be applied in video, short message, voice call and all mobile phone function operations.
  • Encrypted graphics users can also be customized, complex and simple, and give users maximum operational privileges.
  • the camera will reserve a certain waiting time in the camera view interface. When the waiting time expires, if the gesture has not been received, the camera is considered not to be encrypted. For video recording, since the recording process takes a long time, input gestures and recorded video can be performed simultaneously.
  • FIG. 7 is a block diagram of a picture decryption process according to an embodiment of the present invention.
  • the image decryption consists of 6 parts, which are open the gallery, draw gestures, gestures
  • the module, the A/D conversion module, the picture decryption module, and the picture in the last memory are displayed.
  • the user enters the terminal memory display interface, and then controls the gesture, the gesture sensor immediately accepts the reflected infrared light, and then the original image is restored according to the chronological order and the intensity of the infrared light, and the A/D conversion module will receive the simulation.
  • the signal is converted into a corresponding digital signal.
  • the image decryption module mainly analyzes and processes the first two digits of the image file, and then compares with the acquired gesture signal value. If it matches, the image name is changed, the image is visible, and the image can be edited. Do not display, that is, users are not allowed to view related content.
  • FIG. 8 is a flowchart of decryption according to an embodiment of the present invention. As shown in FIG. 8, the process includes the following steps:
  • Step S800 starting;
  • Step S801 the user opens the picture memory
  • Step S802 The user draws a gesture in the air
  • Step S803 the gesture sensor converts the received gesture signal into an electrical signal, and then simulates a corresponding gesture motion according to the electrical signal, and then converts the gesture motion into a series of digital signals after being converted by A ⁇ D;
  • Step S804 Receive the gesture digital signal, rearrange it in reverse order, and then change to a hexadecimal number.
  • the generated hexadecimal number is directly checked with the first two letters and the file suffix name of all the image file names that have been encrypted. ;
  • Step S805 if the match, the picture can be displayed and can be operated. If it does not match, the picture is not displayed, and is invisible;
  • step S806 the process ends.
  • FIG. 9 is a schematic diagram of a sequence of encryption and decryption gestures according to an embodiment of the present invention, wherein the numbers in FIG. 9 represent the order of sliding, and the left diagram in FIG. 9 may be an encrypted schematic diagram, on the right side.
  • the figure may be a schematic diagram of decryption. Due to the reverse reverse order calculation method adopted by the algorithm processor in the embodiment of the present invention, before the user browses the picture or video, the input gesture must be opposite to the order of encryption, if decrypted and encrypted. If the gestures are exactly the same, the match fails.
  • the solution in the embodiment of the present invention is mainly applied to photo-encryption: the specific process is: the user opens the photographing function, and then controls the drawing of the specific gesture, and then can start taking the photograph, the photographing is completed, the image is encrypted, and is not stored in the library and the like. display. If the user wants to view the image, open the gallery and then draw the same gesture in the air, you can open the image for browsing, or various corresponding operations.
  • the method used in this embodiment can also be applied to more scenarios, in addition to the above-mentioned photo process encryption, recording video process encryption, and a short message writing interface, and the call process can be applied, for example, when the user wants to call some people.
  • the user wants to call some people.
  • As an encrypted phone if you don't want other people to answer, you can set the gesture password in the contact.
  • the interface does not display the name of the person. Other users cannot access it. Only the specific user picks up the phone and controls the picture. A specific gesture is required to answer the call.
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • the embodiment of the present invention further describes a computer storage medium.
  • the first type of computer storage medium stores a computer program for executing the file encryption method shown in FIG. 2 in the embodiment of the present invention.
  • a file encryption device is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • the term “module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 10 is a structural block diagram of a file encryption apparatus according to an embodiment of the present invention. As shown in FIG. 10, the apparatus includes an acquisition module 102 and an encryption module 104, which are described below:
  • the obtaining module 102 is configured to acquire the input encrypted password before generating the predetermined file or in the process of generating the predetermined file.
  • the encryption module 104 is connected to the obtaining module 102, and configured to use the encrypted password to generate the predetermined file.
  • the scheduled file is encrypted.
  • the apparatus further includes a hiding module configured to hide the encrypted predetermined file after encrypting the predetermined file by using the encrypted password.
  • the obtaining module 102 may obtain the input encrypted password by acquiring the input first gesture action by using two or more infrared sensors, and converting the first gesture action into the first by analog-to-digital conversion. a digital signal; determining that the first digital signal is an encrypted password.
  • the encryption module 104 may encrypt the predetermined file by determining a suffix of the file name of the predetermined file, and modifying the suffix by using the encrypted password. encryption.
  • the apparatus further includes a decryption module configured to: after encrypting the predetermined file by using the encrypted password, acquire an input decryption password; decrypt the encrypted predetermined file by using the decryption password, and The above predetermined file is displayed.
  • a decryption module configured to: after encrypting the predetermined file by using the encrypted password, acquire an input decryption password; decrypt the encrypted predetermined file by using the decryption password, and The above predetermined file is displayed.
  • the decryption module acquires the input decryption password that can be obtained by acquiring the input decryption password after entering a storage interface for storing the predetermined file.
  • the decryption module acquires the decryption password that can be input by: acquiring a second gesture action by using two or more infrared sensors; and performing the second gesture by analog-to-digital conversion Converting to a second digital signal; determining that the second digital signal is the decryption password.
  • the encrypted password is a first digital signal obtained by converting a first gesture obtained by using two or more infrared sensors
  • the sliding path of the second gesture and the first gesture is reversed.
  • the decryption module may utilize the decrypted password pair by The encrypted predetermined file is decrypted, and displaying the predetermined file includes: restoring a suffix of the file name of the predetermined file by using the decryption password; and displaying the predetermined file with the suffix restored.
  • the encryption module 104 is further configured to encrypt the predetermined file by using the encrypted password again after determining to exit the display interface for displaying the predetermined file after displaying the predetermined file.
  • a terminal comprising the above file encryption device.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the above modules are in any combination.
  • the forms are located in different processors.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the steps in the foregoing method embodiments.
  • the foregoing storage medium may include, but is not limited to, a USB flash drive, a Read-Only Memory (ROM), and a random access memory (Random).
  • Access Memory referred to as RAM
  • mobile hard disk disk or optical disk, and other media that can store program code.
  • the processor executes the steps in the foregoing method embodiments according to the stored program code in the storage medium.
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the predetermined file is encrypted while the predetermined file is generated, so that the encryption operation is not performed after the predetermined file is saved, the security of the file is effectively ensured, and the file existing in the related art is effectively solved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un procédé, un dispositif, un terminal et un support d'informations de chiffrement de fichier, le procédé consistant: à acquérir un mot de passe de chiffrement d'entrée avant la génération d'un fichier prédéterminé ou pendant la génération du fichier prédéterminé (S202) ; et tandis que le fichier prédéterminé est généré, le fichier prédéterminé est chiffré à l'aide du mot de passe de chiffrement susmentionné (S204). Grâce à ce procédé, la sécurité du fichier peut être garantie, ce qui permet de résoudre efficacement le problème de faible sécurité du fichier dans l'état de la technique.
PCT/CN2016/108608 2016-05-23 2016-12-05 Procédé, dispositif, terminal et support d'informations de chiffrement de fichier WO2017201999A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610343947.1 2016-05-23
CN201610343947.1A CN107423628A (zh) 2016-05-23 2016-05-23 文件加密方法、装置及终端

Publications (1)

Publication Number Publication Date
WO2017201999A1 true WO2017201999A1 (fr) 2017-11-30

Family

ID=60411048

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/108608 WO2017201999A1 (fr) 2016-05-23 2016-12-05 Procédé, dispositif, terminal et support d'informations de chiffrement de fichier

Country Status (2)

Country Link
CN (1) CN107423628A (fr)
WO (1) WO2017201999A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552938A (zh) * 2020-04-29 2020-08-18 上海明略人工智能(集团)有限公司 文件加密方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287733B (zh) * 2019-06-05 2021-07-23 杭州迪普科技股份有限公司 一种文件防篡改方法和装置
CN111967032B (zh) * 2020-08-27 2023-08-25 长城计算机软件与系统有限公司 基于混淆处理的文件加密方法及解密方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295341A (zh) * 2008-06-25 2008-10-29 腾讯科技(深圳)有限公司 一种便携式设备及其数据保护方法
CN103699847A (zh) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 指纹加密方法及装置,加密拍摄方法及装置
CN104978541A (zh) * 2015-04-28 2015-10-14 努比亚技术有限公司 一种隐藏影音文件的方法及装置
CN105426746A (zh) * 2015-10-30 2016-03-23 努比亚技术有限公司 密码设置装置和方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295341A (zh) * 2008-06-25 2008-10-29 腾讯科技(深圳)有限公司 一种便携式设备及其数据保护方法
CN103699847A (zh) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 指纹加密方法及装置,加密拍摄方法及装置
CN104978541A (zh) * 2015-04-28 2015-10-14 努比亚技术有限公司 一种隐藏影音文件的方法及装置
CN105426746A (zh) * 2015-10-30 2016-03-23 努比亚技术有限公司 密码设置装置和方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552938A (zh) * 2020-04-29 2020-08-18 上海明略人工智能(集团)有限公司 文件加密方法及装置
CN111552938B (zh) * 2020-04-29 2024-03-15 上海明略人工智能(集团)有限公司 文件加密方法及装置

Also Published As

Publication number Publication date
CN107423628A (zh) 2017-12-01

Similar Documents

Publication Publication Date Title
EP3079082B1 (fr) Procédé et appareil d'affichage d'album
CN107659416B (zh) 一种会议记录分享的方法、装置、会议终端和存储介质
CN105069075B (zh) 照片共享方法和装置
WO2018000585A1 (fr) Procédé, appareil, terminal et serveur de recommandation de thème d'interface
US20150356121A1 (en) Position location-enabled, event-based, photo sharing software and service
KR102327779B1 (ko) 이미지 처리 방법 및 장치
KR20190141790A (ko) 공유된 관심사를 갖는 메시지들의 갤러리
JP2023519625A (ja) ビデオ処理方法、装置、電子機器及び非一時的なコンピュータ読み取り可能な記憶媒体
WO2019109976A1 (fr) Procédé d'enregistrement de dossier de lecture de fichier multimédia, terminal, et support de stockage
US20150205993A1 (en) Method for providing control function using fingerprint sensor and electronic device thereof
CN103561072A (zh) 一种基于互联网的云数据处理方法及云数码相框
CN110826103B (zh) 基于区块链的文档权限处理方法、装置、设备及存储介质
WO2017118250A1 (fr) Procédé, appareil, et dispositif terminal d'embellissement du visage
KR102386893B1 (ko) 이미지 데이터의 보안 방법 및 이를 지원하는 전자 장치
WO2017201999A1 (fr) Procédé, dispositif, terminal et support d'informations de chiffrement de fichier
US20230316529A1 (en) Image processing method and apparatus, device and storage medium
CN111368232A (zh) 口令分享回流方法、装置、电子设备及存储介质
CN110472558B (zh) 图像处理方法和装置
CN105095787A (zh) 一种信息处理方法及装置
CN104869144A (zh) 一种信息分享方法及电子设备
CN112818303B (zh) 交互方法、装置和电子设备
KR20130082980A (ko) 얼굴인식 기반 사용자 맞춤형 추천 시스템
WO2023030116A1 (fr) Procédé et appareil d'affichage
CN105025203B (zh) 结合生理特征之影像加解密方法及其影像捕获设备
CN111581622A (zh) 信息处理方法、装置及电子设备

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16902983

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16902983

Country of ref document: EP

Kind code of ref document: A1